General

  • Target

    payload.exe

  • Size

    187KB

  • MD5

    4eba960b1b7aa04bb80d3a72aac4a06e

  • SHA1

    937569216e9938727fe028533a75cc7d6f88f471

  • SHA256

    f6681278c5948eae88cd0b5507f21c60d10a1fb19b70fbb85e0d51271869efc3

  • SHA512

    25bc0c395ae3f5165ff123b38b7f786a9a1bb220e6256a9b1cee61a2e094993e6bbaec64ad8d61c3a5bb29beb60b9027a0d822640f5e0e8d0857cb7fbaf921f6

  • SSDEEP

    3072:xk9c0KFj5qj6o8KaxfE54HnnGqaKl+b2n8O56pvV0WFmpKa:xkO/j5K62aOanGqCbAvIV0WFAKa

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

penis

C2

http://185.196.9.140

Attributes
  • url_path

    /c3f845711fab35f8.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • payload.exe
    .exe windows:5 windows x86 arch:x86

    75f38a281962eafd8c14d2b02cfcdab6


    Headers

    Imports

    Sections